Performance of Cognitive Radio-Based Wireless Mesh Networks

7 downloads 162492 Views 2MB Size Report
Aug 5, 2010 - Index Terms—Cognitive radio, wireless mesh networks, spectrum sharing, performance evaluation. ... require a wired connection to the Internet, nodes can be installed quickly and ... transmitted over a limited amount of available spectrum. ... benefits that can be gained using CR capabilities. A WMN.
122

IEEE TRANSACTIONS ON MOBILE COMPUTING,

VOL. 10,

NO. 1,

JANUARY 2011

Performance of Cognitive Radio-Based Wireless Mesh Networks Nizar Bouabdallah, Brent Ishibashi, and Raouf Boutaba Abstract—Cognitive radio presents a new approach to wireless spectrum utilization and management. In this work, the potential performance improvement gained by applying cognitive radio to wireless mesh networks is investigated. Specifically, the potential benefits in terms of QoS provided to users and the efficiency of resource utilization are quantified in a system consisting of a collection of one or more service provider wireless networks. To achieve this, we formulate the problem mathematically using integer linear programming. It is shown that the cognitive radio abilities provide an advantage over the classical network, either by improving QoS through increasing the probability of accepting connection requests, or by reducing the resources needed to fulfill the QoS requirements of users. This advantage is gained without impacting the service of primary clients. More importantly, we show that virtual wireless networks can be created, utilizing only the residual wasted bandwidth of the primary service providers. These virtual networks are able to support large volumes of users, while still ensuring that QoS reliability requirements, such as acceptance probability guarantees, are achieved. Index Terms—Cognitive radio, wireless mesh networks, spectrum sharing, performance evaluation.

Ç 1

INTRODUCTION

I

NCREASING demands for broadband wireless services with widespread coverage has made wireless mesh networks (WMNs) an attractive technology. Many WMNs have been deployed, delivering service to campuses, cities, and wide rural areas [1], [2], [3], [4], [5]. As most WMN nodes do not require a wired connection to the Internet, nodes can be installed quickly and inexpensively, with fewer constraints on their placement. They instead rely on wireless communication to interconnect individual access points, forwarding traffic over multiple hops to its destination. However, the scarcity of wireless resources presents a challenge for WMNs. The WMN’s multihop traffic must be transmitted over a limited amount of available spectrum. When combined with the openly shared nature of the medium, these factors limit the traffic capacity a WMN can support. It is, therefore, imperative that WMNs effectively utilize all the wireless resources available to them. Cognitive radio (CR) is a new approach to intelligent managing wireless resources. Although the complete CR picture includes a wide-ranging vision of spectrum management combining perception, coordination, and intelligence, initial works are more limited, focusing on capitalizing on wasted spectrum. Under the current static spectrum allocation model, wireless channels are allocated to specific purposes or users. Primary users of a channel have exclusive rights to that channel. Even if the channel is

. N. Bouabdallah is with INRIA, Campus Universitaire de Beaulieu, 35042 Rennes Cedex, France. E-mail: [email protected]. . B. Ishibashi and R. Boutaba are with the School of Computer Science, University of Waterloo, 200 University Ave. W., Waterloo, ON, Canada. E-mail: {bkishiba, rboutaba}@uwaterloo.ca. Manuscript received 14 May 2008; revised 15 May 2009; accepted 6 Jan. 2010; published online 5 Aug. 2010. For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference IEEECS Log Number TMC-2008-05-0186. Digital Object Identifier no. 10.1109/TMC.2010.149. 1536-1233/11/$26.00 ß 2011 IEEE

idle and resources are being wasted, other wireless users are legally prevented from using the channel. In view of this, despite the demand for and expense of the resource, overall utilization is actually quite low [6]. While some channels in some locations are heavily used, even congested, there are very often others that are essentially unused. The current system for resource allocation creates, therefore, many holes of unused spectrum due to static channel assignment and licensing, which prevents the spectrum bands from being used by anybody other than the primary user/licensee. These spectrum holes are potential opportunities for making smarter use of wireless resources. Regulatory bodies have recognized this opportunity and acknowledged the need for a new system for spectrum management, one that is more flexible, dynamic, and efficient [7]. This impetus, combined with advances in radio technology and software-defined radio, has created the vision of Cognitive Radio. CRs are a new type of radio device, with the ability to detect and exploit residual bandwidth left idle by licensed users, under the condition that they do so without impacting on primary users. For a WMN, CR represents a way to improve overall utilization of available spectrum and expand the spectrum available to individual networks. In this work, we study the benefits that can be gained using CR capabilities. A WMN controlled by one or more service providers, each with their own spectrum resources, is formulated as an Integer Linear Programming (ILP) problem. Using this ILP model, we show that enabling CR can offer improved QoS, the ability to support additional users, increased resource utilization, and QoS differentiation. Although we have intended this ILP formulation primarily as a method for showing the potential capacity, the runtime required to find the optimal configuration is short enough to be useful in moderately sized networks. More importantly, we use this analysis to demonstrate the feasibility of creating a virtual wireless network (VWN) Published by the IEEE CS, CASS, ComSoc, IES, & SPS

BOUABDALLAH ET AL.: PERFORMANCE OF COGNITIVE RADIO-BASED WIRELESS MESH NETWORKS

within the wireless mesh network. This virtual network can operate using only the residual wasted bandwidth of the primary service providers. Despite their lack of dedicated resources, the VWN can support a considerable traffic volume, while still satisfying probabilistic QoS guarantees. The remainder of this paper is organized as follows: The next section presents a background of research related to this work. Section 3 describes the system model to be considered, describing first the classic network, then extending it to include CR capabilities. Following this, Section 4 formulates the system as an ILP problem, which is then used in Section 5 to study and characterize various aspects of the system’s performance. Finally, Section 6 summarizes our conclusions.

2

RELATED WORK

Using cognitive radio in WMNs was studied in [8], [9], and [10]. In [8], the authors investigated the problem of spectrum sharing, i.e., how to divide efficiently the available frequency bands into subbands and allocate them to the traffic demands of CR-enabled users. In their scenario, all of the users are equipped with CR devices. The problem is formulated mathematically as a mixed-integer nonlinear program (MINLP) with the objective of minimizing the radio spectrum resources required to serve a set of sessions, by efficiently dividing and allocating available spectrum. In [9], the authors propose a new spectrum sensing method called COgnitive Mesh NETwork (COMNET) to identify primary user frequencies in the context of WMNs. This work focuses mainly on the assignment of channels between the users and their associated mesh routers. Multihop routing between mesh nodes is not considered since it is assumed to be achieved throughout of band communication on different channels. Yang and Wang [10] focus on network planning, to determine where radios should be optimally placed within the network. The problem is formulated as a large-scale optimization problem, jointly considering data routing, resource allocation, and scheduling. However, it does not consider the notion of prioritized channel use. Each of these works addresses particular aspects of enabling CR within a WMN. This paper considers and quantifies the potential gain to be achieved by taking such an approach, relative to a classic network without CR capabilities. By studying this capacity, a number of interesting characteristics are identified. The term cognitive radio was first used to describe providing software radios with a self-awareness about their characteristics and requirements, so that they could determine the appropriate radio etiquette to use [11]. This self-awareness includes an awareness of its environment, through the monitoring, modeling, and prediction of the radio spectrum [12]. However, much of the recent work on CR has focused on the secondary use of spectrum assigned to primary licenses. For example, the IEEE 802.22 working group on Wireless Regional Area Networks is working toward communications that can coexist with TV broadcast service [13], and the IEEE Standards Coordinating Committee 41 on Dynamic Spectrum Access Networks (DySPANs) has also been established to specify terminology,

123

study coexistence, and conformance issues, and create an architecture for making radio resource decisions [14]. The capacity of CR has been addressed in several works. In both [15] and [16], the authors address the capacity of CR from the information theory perspective. These works focus on the amount of information that is possible to encode on the wireless channel. This work takes a different approach, instead addressing CR from a network point of view, particularly the network’s ability to support QoS while relying on CR. Other works have focused on the ability of CR to support opportunistic data traffic within identified spectrum holes. However, the characteristics and requirements of this additional traffic may be fundamentally different from the original traffic, therefore giving a distorted view of the true gains achieved by CR. In this work, users with different QoS-level requirements and various CR scenarios are directly compared to classic networks. Of course, there have been numerous works on resource allocation in wireless mesh networks, ad hoc networks, as well as other types of networks. Both [17] and [18] consider joint channel assignment and routing in mesh and ad hoc networks. Many works on resource allocation in mesh or mesh-like networks have relied on linear-programmingbased approaches for this optimization, including [17], [19]. In each of these works, the linear programming formulation is the tool used to investigate the specific problems considered in each work. Finally, we have previously addressed the capacity gains of CR within single-hop systems of networks. In [20], we used a Markov-chain-based analysis, to evaluate the QoS gains achieved through enabling CR, as well as demonstrating the feasibility of a CR-based virtual wireless network. This work adopts the same basic approach in terms of comparing QoS experienced in classic and CR-enabled scenarios, however, focuses on multihop WMNs, and uses ILP to formulate the problem.

3

SYSTEM MODEL

We represent a WMN by a directed graph GðV ; EÞ, called a connectivity graph. Each node i 2 V ¼ f1; . . . ; Ng represents an Access Point (AP), which is characterized by a circular transmission range Rt ðiÞ and an interference range RI ðiÞ (also called hearing or carrier sensing range). During the transmission of a node i, all the nodes inside its interference range, denoted by HðiÞ, sense the channel to be busy and cannot access the medium. Hereafter, we denote by H þ ðiÞ ¼ HðiÞ [ fig and by H  ðiÞ the set of nodes that node i cannot hear, i.e., H  ðiÞ ¼ V nH þ ðiÞ. We denote by I the interference matrix of GðV ; EÞ. I is a matrix with rows and columns labeled by the graph vertices V , with a 1 or 0 in position ði; jÞ according to whether j is within the interference range RI ðiÞ of i (i.e., j 2 H þ ðiÞ) or not. On the other hand, during the transmission of the node i, all the nodes residing in its transmission range, and thus, representing its neighborhood denoted by Ne ðiÞ, receive the signal from i with a power strength such that correct decoding is possible with high probability. A unidirectional wireless link exists between i and every neighbor j 2 Ne ðiÞ and is represented by the directed edge ði; jÞ 2 E.

124

IEEE TRANSACTIONS ON MOBILE COMPUTING,

We represent the graph connectivity by a connectivity matrix T . The connectivity matrix T of GðV ; EÞ is a matrix with rows and columns labeled by the graph vertices V , with a 1 or 0 in position ði; jÞ according to whether i and j are directly connected or not. We note that this model of pairwise interference has numerous criticisms [21]. Perhaps, most importantly, the model ignores the effects of multiple interference, where two or more transmissions can additively combine to disrupt a communication, despite each being beyond their singular interference range. Although this could be addressed by making the interference matrix I a nonbinary matrix and modifying our formulation, we have chosen to rely on this well-known model, rather than utilizing a wireless model that has not been validated. The system under consideration is a WMN made up of one or more service provider networks. For this, we consider the scenario where all mesh APs combine to create a single infrastructure (graph), with different providers differentiated by spectrum resources alone. Each service provider has its own independent set of channels to be used within the mesh network. This makes the assumption that infrastructure from all service providers is colocated, which is, in fact, consistent with many cellular deployments where base stations share a common tower. The general case (where infrastructure is not colocated) raises a number of additional questions about the sharing both spectrum and physical resources. It is, therefore, left to future work. This work will consider the capacity gains achieved by utilizing CR in the presence of such multiple primary networks. In order to illustrate and quantify the performance improvement gained by enabling CR capabilities, a simple classical network is first described. The cognitive network can then be created by extending the classic network with the additional requirements and capabilities of CR.

3.1 The Classic Network Consider the network of service provider k ðk ¼ 1; . . . ; KÞ. The network possesses wireless resources in the form of Mk channels on each wireless link. Connection-based traffic is considered, where service requirements of each flow or connection lk are continuous and constant. Each flow requires the capacity of one channel on each hop along the path between the source and destination nodes for the duration of its service in order to fulfill its requirements. Flows arrive at the network and request service. If the network has available resources, it can accept the flow. If not, then the flow must be blocked—service is refused and the flow ends without being serviced. Once accepted, a flow must have continuous service for the duration of its service time. After the service time has elapsed, the flow is deemed to have been completed successfully. It is then terminated and the wireless channels along the path are released. The single (i.e., K ¼ 1) classic two-node network (i.e., one hop) is depicted in Fig. 1. The classical system consists of K classical networks. Each network has its own set of channels, with the total P M capacity of the system being M ¼ K k . However, k¼1 these networks are completely independent of each other, with clients arriving to network k only being serviced on network k.

VOL. 10,

NO. 1,

JANUARY 2011

Fig. 1. A two-node WMN with five channels.

In this scenario, traffic only occupies channels on its home network, never utilizing channels of any other network. As a result, when a network reaches its capacity, it must start blocking flows, as it has no available channels. Therefore, flows may be blocked even if the overall utilization of the total system (the complete set of K networks) is relatively low.

3.2 The Cognitive Scenario The above model for a system of classical networks represents the existing primary users of spectrum. The requirements and capabilities of cognitive radio devices are now considered. With CR enabled, rather than simply blocking flows, the home network can search for another way to service the flow. Depending on the model used, the home network could request that another network (network k0 , k0 6¼ k) provides service to the user on one or multiple hops of the path. Alternatively, network k could borrow (lease) a channel from network k0 in order to to service the flow. Note that although these two approaches require different system architectures, the result is essentially the same. First, classical and cognitive traffic for network k are distinguished as lCL ðkÞ and lCR ðkÞ, respectively. The behavior of classical traffic is the same as in the purely classical case—it can operate on its home network (network k) only. However, for cognitive traffic, if resources are not available on its home network in certain hops, the flow can switch to another network (operate on network k0 , k0 6¼ k) if that network has available channels. As in the purely classic network, classic flows are still blocked if the home network is fully occupied by its own flows (classic or cognitive). Cognitive flows, however, are only blocked if the home network is fully occupied by its own flows and all other networks are also fully occupied. 3.3 Virtual Wireless Networks Using the concept of a cognitive user, VWNs are a special case of this wireless network model. With no physical resources of its own, the VWN is a network k with Mk ¼ 0. This means that a VWN does not service traffic on its own, instead relying on other (real) networks to provide service to its client flows. Therefore, although a VWN has its own traffic, all of its flows must obviously be of cognitive type. Any classic flows would not be serviced, as there are never resources available

BOUABDALLAH ET AL.: PERFORMANCE OF COGNITIVE RADIO-BASED WIRELESS MESH NETWORKS

125

TABLE 1 Mathematical Notations

for them. Cognitive flows, however, can be handled in the same way as they are in the cognitive networks.

4

PROBLEM FORMULATION

The notations used in this work are summarized in Table 1. This work will consider the capacity gains achieved by utilizing cognitive radio in the presence of one or more existing primary networks. The problem can be expressed in the form of an ILP problem within a WMN as follows: GIVEN A physical topology represented by the graph GðV ; EÞ, which is described by the connectivity and interference matrixes T and I, respectively. Each P wireless link represents M ¼ K k¼1 Mk channels. So, the physical topology is completely defined by: T , I: the connectivity and the interference matrixes, respectively; K: the number of service provider networks; and Mk : the number of channels (subbands) possessed by each service provider network kðk ¼ 1; . . . ; KÞ. . A list L of connection requests between mesh nodes. We denote by sðlÞ and dðlÞ the source and destination nodes of connection l 2 L, and hðlÞ 2 f1; . . . ; Kg the home network of connection l. FIND

.

The optimal routing maximizing the total network throughput (i.e., minimizing the number of blocked connections). According to our optimization problem, connections are established on the basis of maximizing the total network throughput. First, the problem will be treated in the light of classic networks. Afterward, it will be considered in the .

context of CR systems by extending the classic network with the additional requirements and capabilities of CR.

4.1 ILP Formulation for Classic WMNs In this section, we provide an ILP formulation of the problem that consists of maximizing the throughput inside a WMN composed of independent classic networks (i.e., when CR capability is disabled). In this case, flows only occupy channels on their home networks, never utilizing channels of any other network. Using some of the notations from [8], we formulate the problem as follows: 4.1.1 Interference Constraints Once a node i successfully accesses the shared medium, it blocks the transmission on that channel of all nodes inside its interference range (i.e., HðiÞ) during the service time of the connection l. The node i transmission may also prevent the nodes in HðiÞ from receiving correctly from their neighbors that are hidden from i, according to the signal capture property. In view of this, successfully carrying connection l across hop ði; jÞ on channel ðk; mÞ (i.e., channel m of the network k spectrum band) requires both nodes i and j to be neither already transmitting nor receiving data on that channel. Consequently, the sender node i must not be within the interference range of any node p transmitting on channel ðk; mÞ. With regards to the receiver node j, a successful transmission from i to j requires all the hidden nodes from i (i.e., H  ðiÞ \ HðjÞ) to be silent during the service time of connection l. Specifically, successfully carrying a connection across hop ði; jÞ on the wireless channel ðk; mÞ needs that channel to be idle on each wireless link ðp; qÞ (i.e., dðp; qÞ  Rt ðpÞ) verifying the following condition:

126

IEEE TRANSACTIONS ON MOBILE COMPUTING,



dðp; iÞ  RI ðpÞ; or dðp; jÞ  RI ðpÞ;

VOL. 10,

NO. 1,

JANUARY 2011

ð1Þ

where dðp; qÞ denotes the distance between nodes p and q. If the link ðp; qÞ verifies the condition (1), it is referred to as interferer link to the link ði; jÞ. Note that in (1), we have not considered the signal capture property. ðk;mÞ Let consider the variable xij representing the state of the channel ðk; mÞ on the link ði; jÞ and defined as follows: 8 < 1; if node i transmits to node j on channel ðk;mÞ ¼ ðk; mÞ; xij : 0; otherwise; where channel ðk; mÞ is the channel m 2 f1; . . . ; Mk g of the ðk;mÞ network k spectrum band. xij verifies, therefore, ðk;mÞ

xij

 Tði;jÞ :

ð2Þ

According to (1), node i cannot connect to node j if this latter is already occupied due to a transmission of a node p 6¼ i that node j is within its interference range (including the node j itself, i.e., p ¼ j), which gives: X ðk;mÞ xij þ Iðp;jÞ Tðp;qÞ xðk;mÞ  1: ð3Þ pq q2V

Moreover, node i cannot transmit to neighbor j on the channel ðk; mÞ, while node i is already occupied in reception on that channel due to a transmission of a node p 6¼ i that node i is within its interference range (i.e., node i cannot transmit on a sensed busy channel), which yields to X ðk;mÞ xij þ Iðp;iÞ Tðp;qÞ xðk;mÞ  1: ð4Þ pq q2V

Node i also cannot transmit to multiple neighbors using the same channel. Hence, given a channel ðk; mÞ, we have X ðk;mÞ xiq  1: ð5Þ

Fig. 2. A five-node WMN: Interference constraint illustration.

while hearing the transmission of node 2 as dictated by constraint (4). Satisfying both connections is indeed not usually possible in the wireless environment.

4.1.2 Routing Constraints Routing a connection l in a multihop wireless network needs using different channels on the interfering hops ðk;mÞ along the path. Let consider the binary variable yij ðlÞ defined as follows: 8 < 1; if connection l uses on its route the ðk;mÞ channel ðk; mÞ on link ði; jÞ; yij ðlÞ ¼ : 0; otherwise: ðk;mÞ

As such, yij

ðk;mÞ

yij

Mk X K X X

ð7Þ

ðk;mÞ

Tði;sðlÞÞ yisðlÞ ðlÞ ¼ 0:

ð8Þ

k¼1 m¼1 i2V

In the same way, the destination node dðlÞ cannot transmit data for connection l: Mk X K X X

ðk;mÞ

TðdðlÞ;jÞ ydðlÞj ðlÞ ¼ 0:

ð9Þ

k¼1 m¼1 j2V

q2V

According to (6), node i cannot use the same frequency for transmission and reception due to self-interference at the physical layer. But node i is allowed to transmit on that frequency if the detected signal is not intended to i, even if in reality, protocol constraints often prevent node i from transmitting on a channel that is sensed busy. To illustrate the difference between constraints (4) and (6), let consider the simple five-node WMN in Fig. 2. Each wireless link is supposed to have only one channel. Two connection requests are to be served between the pair of nodes ð2; 1Þ and ð4; 5Þ. Considering constraint (6) instead of (4), both connections can be served. However, in reality, protocol constraints often prevent node 4 from transmitting

ðlÞ  Tði;jÞ :

Clearly, the source node of connection l (i.e., sðlÞ) cannot receive the traffic of l. Hence, we have

q2Ne ðiÞ

Note that in [8], node i is allowed to transmit on a busy channel ðk; mÞ (i.e., while node i is already hearing another node transmission on that same channel) given that the sensed signal is not intended to i. In other words, the following constraint is used instead of (4): X ðk;mÞ ðk;mÞ xij þ Tðq;iÞ xqi  1: ð6Þ

ðlÞ verifies:

In other words, constraints (8) and (9) avoid the traffic coming in its source node or going out its destination node. Moreover, for an intermediate node q, i.e., q 6¼ sðlÞ and q 6¼ dðlÞ, we have Mk X K X X k¼1 m¼1 i2V

ðk;mÞ

Tði;qÞ yiq

ðlÞ ¼

Mk X K X X

ðk;mÞ

Tðq;jÞ yqj

ðlÞ:

ð10Þ

k¼1 m¼1 j2V

This constraint, called flow continuity constraint, ensures the path to be continuous (i.e., connected). Considering classic networks, a flow only occupies channels on its home network hðlÞ, never utilizing channels of any other network. Hence,

BOUABDALLAH ET AL.: PERFORMANCE OF COGNITIVE RADIO-BASED WIRELESS MESH NETWORKS ðk;mÞ

yij

ðlÞ ¼ 0 if k 6¼ hðlÞ;

8m 2 f1; . . . ; Mk g:

ð11Þ

The following constraint (12) stipulates that a connection is successfully served to its destination only if it is carried by one of the channels that terminates at that destination: Mk X K X X

SuccessðlÞ ¼

ðk;mÞ

Tði;dðlÞÞ yidðlÞ ðlÞ;

ð12Þ

k¼1 m¼1 i2V

where SuccessðlÞ is an output binary variable of the optimization problem that takes 1 if connection l is served and 0 otherwise. In the same way, a connection l is successfully served to its destination only if it is carried by one of the channels that originates at the source node sðlÞ. Hence, SuccessðlÞ ¼

Mk X K X X

ðk;mÞ

TðsðlÞ;jÞ ysðlÞj ðlÞ:

ð13Þ

k¼1 m¼1 j2V

It can be easily verified that constraints (12) and (13) are equivalent given the constraints (8), (9), and (10). Hence, it is sufficient to list only one of them in the formulation. Finally, constraint (14) relates the physical topology ðk;mÞ ðk;mÞ to the routing variable yij ðlÞ as follows: variable xij X ðk;mÞ ðk;mÞ Tði;jÞ xij ¼ Tði;jÞ yij ðlÞ: ð14Þ l2L

Constraint (14) limits the number of connections routed through the channel ðk; mÞ on link ði; jÞ to at most 1. Based on the above formulation, maximizing the number of accepted connections turns out in maximizing the following objective function: X SuccessðlÞ: ð15Þ Maximize l2L

We now introduce optional constraints that do not impact the final result provided by the objective function (15), but ðk;mÞ necessary to derive correctly the output variable yij ðlÞ, which can be used to calculate other performance metrics such as the network resource utilization or spatial reuse. First, to avoid the construction of a path in the form of a loop for a rejected connection l, we need to introduce the following constraint: ðk;mÞ

Tði;jÞ yij

ðlÞ  SuccessðlÞ:

ð16Þ

In the same way, the following constraint is required to avoid the formation of loops on the path of an accepted connection l: Mk X K X X

ðk;mÞ

Tði;qÞ yiq

ðlÞ  1:

ð17Þ

k¼1 m¼1 q2V

4.2 ILP Formulation for CR-Enabled WMNs In this case, the requirements and capabilities of cognitive radio devices are considered. We have two types of connections for each network k, classical and cognitive flows according to whether the customer is contracted to the cognitive radio service or not. The behavior of classical flows is the same as in the purely classical case—it can operate on its home network (network k) only. However, for

127

a cognitive flow, if resources are not available on its home network, the flow can use another network resources. We introduce the binary variable CRðlÞ to indicate whether connection l has CR capabilities (i.e., CRðlÞ ¼ 1) or not. To allow the CR-enabled connections be served by foreign networks, we modify constraint (11) as follows:   ðk;mÞ yij ðlÞ ¼ 0 if k 6¼ hðlÞ and CRðlÞ ¼ 0 ; ð18Þ 8m 2 f1; . . . ; Mk g: We recall that home (primary) connections have a preemptive priority over foreign CR-enabled connections. The above ILP formulation does not stipulate such priority among different types of connections. Primary (i.e., home) and foreign connections are considered as equally important when contending for the use of the network resources. One way to introduce priority among different connections is carrying them into two steps: First step: Carry all the connections (classic or CRenabled) only through their home networks with the objective maximizing the network throughput. This turns out in serving the connections without considering the CR-capabilities. . Second step: Carry the remaining nonserved CRenabled connections using the still available resources on both home and foreign networks with the objective maximizing the network throughput. It is worth noting that running steps 1 and 2 successively and independently does not allow necessarily the global problem optimization. To achieve this, the preemptive priority among classic and CR-enabled foreign connections can be expressed simply by modifying the objective function as follows: X Maximize A  Shome ðlÞ þ Sforeign ðlÞ; ð19Þ .

l2L

where A is a constant that is greater than jLj, Shome ðlÞ is a binary variable indicating whether connection l is served only using its home network resources or not, and Sforeign ðlÞ is a binary variable indicating whether connection l is served or not while using at least one foreign resource along its path. The objective function (19) simply implies that satisfying a connection through its home network is better than blocking such connection in order to serve A CR-enabled connections by using foreign resources. This is achieved by giving a greater weight for the service of primary connections over foreign connections in the objective function. Therefore, putting A  jLj gives a preemptive priority to connections routed on their home networks over foreign CR-enabled connections. We now introduce the following constraints to take into account the new variables Shome ðlÞ and Sforeign ðlÞ: Shome ðlÞ ¼ SuccessðlÞ if CRðlÞ ¼ 0; ðk;mÞ

Sforeign ðlÞ  Tði;jÞ yij

8l;

ð20Þ

  ðlÞ if hðlÞ 6¼ k and CRðlÞ ¼ 1 ;

8i; j; k; m; l; Shome ðlÞ þ Sforeign ðlÞ ¼ SuccessðlÞ;

ð21Þ 8l:

ð22Þ

128

IEEE TRANSACTIONS ON MOBILE COMPUTING,

4.3 Generic ILP Formulation To summarize, we are given a list of jLj connections to be served between different pairs of mesh nodes. Each connection l is identified by the tuple fsðlÞ; dðlÞ; hðlÞ; CRðlÞg. Each service provider network has a set of wireless channels that can be used to route connection requests. We aim at maximizing the number of accepted connections subject to the physical constraints considering both classic and CRenabled systems. The optimization problem can be formulated mathematically as follows: X Maximize jLj  Shome ðlÞ þ Sforeign ðlÞ:

VOL. 10,

NO. 1,

JANUARY 2011

can now be evaluated. Three QoS metrics are considered: probability of accepted connections, network resource utilization, or spatial reuse as well as the average number of hops per accepted connection.

4.4.1 Acceptance Probability PA ðk; CLÞ is the probability of accepting arriving classic flows belonging to network k and can be expressed as follows: P 1fhðlÞ¼kg 1fCRðlÞ¼0g SuccessðlÞ ; PA ðk; CLÞ ¼ l2L ð23Þ P max 1; l2L 1fhðlÞ¼kg 1fCRðlÞ¼0g

l2L

Subject to: ðk;mÞ

xij

ðk;mÞ xij

 Tði;jÞ ; 8i; j; k; m; X þ Iðp;jÞ Tðp;qÞ xðk;mÞ  1; pq

8i; j; p 6¼ i; k; m;

where 1A is the indicator function of the condition A, i.e., it is equal to 1 if the condition A is true and 0 otherwise. PA ðk; CRÞ is the probability of accepting cognitive flows of network k. It is given by P

q2V

ðk;mÞ

xij

þ

X

Iðp;iÞ Tðp;qÞ xðk;mÞ  1; pq

8i; j; p 6¼ i; k; m;

q2V

X

ðk;mÞ

 1;

xiq

 Tði;jÞ ;

Mk X K X X k¼1 m¼1 i2V Mk X K X X k¼1 m¼1 j2V Mk X K X X

ðk;mÞ

Tði;sðlÞÞ yisðlÞ ðlÞ ¼ 0;

8l;

P PA ðkÞ ¼

ðk;mÞ TðdðlÞ;jÞ ydðlÞj ðlÞ ðk;mÞ

Tði;qÞ yiq

ðlÞ ¼

¼ 0;

8l;

Mk X K X X

ðk;mÞ

Tðq;jÞ yqj

ðlÞ;

k¼1 m¼1 j2V

8l; q with q 6¼ sðlÞ and q 6¼ dðlÞ   ðk;mÞ yij ðlÞ ¼ 0 if k 6¼ hðlÞ and CRðlÞ ¼ 0 ; 8i; j; k; m; l Mk X K X X ðk;mÞ SuccessðlÞ ¼ Tði;dðlÞÞ yidðlÞ ðlÞ; ðk;mÞ

ðk;mÞ

Tði;jÞ yij

¼

k¼1 m¼1 i2V X ðk;mÞ Tði;jÞ yij ðlÞ; l2L

ðlÞ  SuccessðlÞ;

Mk X K X X

ðk;mÞ

Tði;qÞ yiq

ðlÞ  1;

8l;

8i; j; k; m; l; 8i; l;

Shome ðlÞ ¼ SuccessðlÞ if CRðlÞ ¼ 0; 8l;   ðk;mÞ Sforeign ðlÞ  Tði;jÞ yij ðlÞ if hðlÞ 6¼ k and CRðlÞ ¼ 1 ; 8i; j; k; m; l Shome ðlÞ þ Sforeign ðlÞ ¼ SuccessðlÞ;

8l;

where T ; I; l; sðlÞ; dðlÞ; hðlÞ, and CRðlÞ are input parameters, ðk;mÞ

ðk;mÞ

; yij

1 SuccessðlÞ :  fhðlÞ¼kg P max 1; l2L 1fhðlÞ¼kg l2L

ð25Þ

Note that as each flow requires the full capacity of one channel over each hop, the probability of accepted connections is equivalent to the network (end-to-end) throughput. In Appendices A and B, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety. org/10.1109/TMC.2010.149, we show how our formulation can be easily extended to include the general case where connections with different rates use different channel capacities.

8i; j; k; m;

k¼1 m¼1 q2V

while xij

ð24Þ

The total acceptance probability PA ðkÞ for arriving flows to network k (both classic and CR-enabled connections) is given by

8i; j; k; m; l;

k¼1 m¼1 i2V

Tði;jÞ xij

1 1 SuccessðlÞ :  fhðlÞ¼kg fCRðlÞ¼1g P max 1; l2L 1fhðlÞ¼kg 1fCRðlÞ¼1g l2L

8i; k; m;

q2Ne ðiÞ ðk;mÞ yij ðlÞ

PA ðk; CRÞ ¼

ðlÞ; Shome ðlÞ, Sforeign ðlÞ, and SuccessðlÞ are

4.4.2 Utilization or Spatial Reuse The utilization Uk is the average occupancy of all channels on network k. Therefore, it is the average number of channels that are in use, divided by the total number of channels of network k. The total number of channels is counted as the sum of wireless channels on each link (i.e., between each pair of neighbor nodes) regardless of the interference between different wireless links. Hence, Uk can be expressed as follows: PMk P P ðk;mÞ Tði;jÞ yij ðlÞ m¼1 i;j2V P l2L : ð26Þ Uk ¼ Mk i;j2V Tði;jÞ

output optimization variables. Note that putting the CRðlÞ ¼ 0 for all connection l 2 L, we get the ILP formulation in the context of classic WMNs.

The utilization U of the total system of networks is then

4.4 Performance Metrics Building on the output results of the above ILP problem resolution, the performance of the different classes of flows

k¼1



K X

Uk

Mk : M

ð27Þ

The meaning of utilization values is not always clear in a multihop network. Therefore, an alternative metric to

BOUABDALLAH ET AL.: PERFORMANCE OF COGNITIVE RADIO-BASED WIRELESS MESH NETWORKS

Fig. 3. A 23-node wireless mesh network.

consider is the spatial reuse of network k channels. The spatial reuse of channel ðk; mÞ is defined as the average number of transmissions on that channel over the whole network. The spatial reuse of network k channels can be then given by X SRk ¼ Uk Tði;jÞ : ð28Þ i;j2V

The spatial reuse of any channel in the total system is then X Tði;jÞ : ð29Þ SR ¼ U i;j2V

For a given network, utilization and spatial reuse are proportional. However, we feel that spatial reuse gives a clearer meaning in the context of WMNs.

4.4.3 Average Number of Hops The average number of hops per accepted connection is given by PK PMk P P ðk;mÞ ðlÞ m¼1 i;j2V l2L Tði;jÞ yij k¼1   H¼ : ð30Þ P max 1; l2L SuccessðlÞ

5

PERFORMANCE EVALUATION

In this section, we evaluate the gain enabled by using CR capabilities in WMNs. We first compare the CR-enabled systems to the classic networks and assess the introduced gain in terms either of resource savings or the QoS levels

129

provided to users. We also show the performance of virtual wireless networks that can be created utilizing only the residual wasted bandwidth of the primary service providers. Then, we study the cognitive abilities to differentiate QoS for different user types on the same network. We show how this feature can also enable further resource savings while fulfilling the different user classes’ requirements. Most of this analysis is achieved using the 23-node WMN in Fig. 3 [3], [4]. Random network deployments of varying size have also been considered in Section 5.4. These results were obtained using a commercial ILP solver, “CPLEX” [22], taking into consideration the different network resource and topology parameters and various traffic scenarios. The reported results for each experience are averaged over 100 traffic demand sets (i.e., L). For each traffic set, the source/destination pairs of the connection requests are randomly generated. The ILP problem is NP-complete. The resolution of the ILP formulation is computationally intensive. While the 23-node network can be resolved in a relatively short period of time, the time required to evaluate larger networks quickly stretches to hours or days and beyond.

5.1 Classic Network Baseline The case of a single classic network was used to develop a baseline to which CR improvements could be compared. Results from the single network case can easily be extended to multiple networks as the networks are, by definition, independent of each other. Obviously, for a single network, only classic traffic must be considered. It is assumed that the network service provider must deliver a certain level of QoS, based on the probability of accepted connections. Fig. 4a shows the probability of accepted connections for various traffic intensities (i.e., various numbers of connection requests arriving to the classic network): jLj ¼ 1, jLj ¼ 2, and jLj ¼ 5. Results for networks with between 1 and 10 channels are shown. Two main observations can be identified. First, the acceptance probability increases with the increase of the number of channels, as more resources are available. Moreover, increasing the network load (i.e., jLj) increases the number of blocked connections. Fig. 4b shows the spatial reuse of the network. At small numbers of channels, the reuse is very low, meaning that a large number of channels are not exploited to the full extent possible. Many links are unoccupied much of the time, as

Fig. 4. Classic baseline network. (a) Probability of accepted connections. (b) Spectrum reuse. (c) Average number of hops per accepted connection.

130

IEEE TRANSACTIONS ON MOBILE COMPUTING,

VOL. 10,

NO. 1,

JANUARY 2011

Fig. 5. One classic + one cognitive network system. (a) Probability of accepted connections. (b) Spectrum reuse. (c) Average number of hops per accepted connection.

there are not enough frequencies (i.e., channels) to avoid interhop interference when serving the multihop connections. For example, if the network has only one channel, all the connections requiring more than one-hop path would have to be rejected. Only connections between neighboring nodes can, in this case, be served. Therefore, the number of accepted connections is very low, resulting in a very low utilization of the network channels. Increasing the number of channels increases the spectrum reuse as the number of accepted connections increases. However, once all the connection requests are already accepted, further increasing the number of channels results in resource underutilization and wastage. This explains the convex shape of the curves. Fig. 4c shows the average number of hops H used by an accepted connection. This increases as the number of channels increases. The rational behind this can be explained as follows: if the number of channels is small, particularly if it is 1, then only one-hop connections between neighboring nodes can be served. Increasing the number of channels gives the network more flexibility to meet the interference constraints, allowing it to serve connections requiring longer paths.

5.2 Cognitive Radio Network Scenarios With the basic classic network case established, cognitive radio networks can now be explored. This exploration begins with the simplest cases involving only two networks, then continues with larger systems. Additionally, this section discusses only systems where all networks have the same number of channels (with the exception of virtual networks). Three cases are possible: in the first, only one of the networks has clients with cognitive abilities, while the other network is entirely a classic network; in the second, both networks utilize cognitive radios; in the third case, the system consists of one or multiple classic networks and one VWN. 5.2.1 One Classic + One Cognitive Network In the first scenario, consider two nearly identical networks—both networks have the same number of channels, and the same traffic intensities (exactly half of the connection requests, i.e., jLj=2, arrive to each network). However, while network 1 is a classic network, network 2’s clients are equipped with cognitive radios, enabling them to operate on either network.

Using the same set of traffic demands of the baseline case, Fig. 5a shows the acceptance probability PA ðkÞ for each of the two networks’ connections. While the classic network’s PA ð1Þ has remained the same as expected, network 2’s PA ð2Þ has been dramatically increased. A CRenhanced connection of network 2 can indeed mix between home resources and network 1 resources along the different hops of its path in order to be served. More significantly, however, Fig. 5a shows that fulfilling a given QoS level required by clients needs deploying less resources by a service provider enhancing its users by the CR capabilities. For instance, for a classic network in the above system with load jLj ¼ 10, maintaining a PA  0:8, needs a set of nine channels. Instead, the cognitive network needs only six channels to achieve the same target. Clearly, the cognitive abilities provide an advantage over the classical network, either by improving QoS through increasing the acceptance probability, or by achieving great savings on resources needed to fulfill the QoS requirements of users, all without impacting clients on network 1. As more CR-enhanced connections are accepted, the spectrum reuse of the total system of networks increases compared to a system of classic networks, as shown in Fig. 5b. The cognitive capabilities allow also more flexibility for the cognitive network to serve distant connections as it profits from the available channels on the classic network. In view of this, the average number of hops per accepted connection in the system increases compared to the case where only classic networks are considered, as shown in Fig. 5c.

5.2.2 Two Cognitive Networks The same evaluation has been performed for the two network scenario, with both networks supporting CRenhanced clients. Considering the same traffic pattern, the resulting acceptance probability as depicted in Fig. 6a is very similar to the cognitive network in the previous two-network scenario (see Fig. 5a). Enhancing the classic network with cognitive capabilities improves, however, the spectrum reuse in the system, as shown in Fig. 6b. Additional connections are indeed accepted for network 1. Fig. 6c shows that enabling CR capabilities on both networks also improves the probability of accepting distant

Fig. 6. Two cognitive network system. (a) Probability of accepted connections. (b) Spectrum reuse. (c) Average number of hops per accepted connection.

Fig. 7. One classic + one virtual wireless network system. (a) Probability of accepted connections. (b) Spectrum reuse. (c) Average number of hops per accepted connection.

connections. The average number of hops per accepted connections increases compared to the previous scenarios. This indicates that the network has more capabilities to carry a connection through a relatively long path (i.e., not necessarily using the shortest path) in order to profit from the spatial reuse of the spectrum. This feature is more pronounced when CR is enabled. Clearly, the cognitive systems are a major improvement over the classic networks.

5.2.3 One Classic + One Virtual Wireless Network To take advantage of some of this remaining unutilized bandwidth, virtual networks are now introduced to the scenario. The simplest scenario involving a virtual network is the system consisting of one classic network and a virtual network. Both networks have the same traffic intensities (exactly half of the connection requests, i.e., jLj=2, arrive to each network). If the classic network traffic intensity is already high, then obviously, the virtual network cannot make the same QoS guarantee. One possibility is to simply support additional traffic, without any QoS guarantees— this is often the approach suggested in CR. Fig. 7a shows the acceptance probabilities if the VWN network has to serve the same number of connection requests as the classic network. The QoS performance of the additional virtual network connections is lower than that of the classic network. To achieve comparable QoS performance, the VWN has to deal with lower traffic intensity. In other words, it has to maintain fewer subscriber contracts. For instance, the 10-channel classic network ensures

90 percent of the connections to be accepted among the jLj=2 ¼ 5 simultaneous client demands. To achieve the same performance, the VWN has to limit the number of concurrent connections to 2. In view of this, virtual service providers could take different approaches: either service a small number of clients with high QoS requirements, or accept large number of virtual-aware clients without any QoS guarantees on the provided service. In the latter case, connections may experience low QoS performance, however, as shown in Fig. 7b, this traffic does increase the utilization of resources (i.e., spectrum reuse) compared to classic networks, similarly to the previous CR scenarios. Fig. 7c shows, however, that the average number of hops per accepted connection for the VWN is lower than that of the baseline classic network case. Unlike the previous scenarios, enabling CR reduces the resulting H in the total system for this scenario. This is because the VWN does not service traffic on its own, instead it relies on other (real) networks to provide service to its client flows. In other words, it profits from the remaining available spectrum on real networks. However, the spectrum of a real network is utilized by its primary clients in such a way that the remaining free spectrum on each hop is not sufficient to carry easily multihop connections due to the interference constraints. In this regard, short connections are more likely to be served successfully by VWNs.

132

IEEE TRANSACTIONS ON MOBILE COMPUTING,

Fig. 8. QoS levels provided by VWN when varying the number of classic networks.

5.2.4 Multiple Classic + One Virtual Wireless Network In the two-network scenario, the only way to improve the VWN QoS performance is to reduce the number of contracted clients. The more interesting scenario occurs as more classic networks are introduced. Consider the scenario where there are K networks: one VWN and K  1 independent classic networks. Each classic network kðk ¼ 1; . . . ; K  1Þ possesses Mk ¼ 2 channels. For the traffic intensity, we consider two cases: in the first case, each classic network receives only one connection request; in the second case, two connection requests arrive to each classic network. In both cases, the VWN receives four connection requests, which is four and two times the intensity of a classic network in the first and second case, respectively. While any additional classic traffic would deteriorate the QoS performance, if an additional virtual network is added using CR-techniques, it can make use of unused capacity on any of the existing networks, without affecting the acceptance probability of the classic networks. Fig. 8 shows the resulting QoS for a VWN in a system containing K  1 classic networks. As can be seen in the figure, the resulting performance depends on both the number of networks and the number of connection requests. Fig. 8 shows two important properties.

VOL. 10,

NO. 1,

JANUARY 2011

First, as the number of classic networks increases, PA (VWN) increases, as there is an increased probability that one of the networks has available resources. Second, increases in jLj (number of connection requests per classic network) result in a decrease in the PA (VWN). This is due to the fact that fewer resources remain available on the classic network when the demand for connections increases. This leaves a lower probability of having resources available for cognitive use. Again, we note that each classic network continues to maintain the same QoS performance for its clients regardless of the number of classic networks in the system. However, as the number of classic networks increases, the QoS performance of the virtual service provider improves. More importantly, the QoS performance of VWN clients outperforms that of classic networks. Considering a system with five classic networks, each operating with a traffic intensity equal to 2, the VWN actually allows 83 percent of the arriving connections to be accepted. This is equivalent to the performance of a classic network with six channels instead of two (see Fig. 4a). This is a tremendous improvement over multiple classical networks.

5.3 Impact of the Network Connectivity Degree In the scenarios so far, the connectivity degree  of the WMN was 3, i.e., each node has, on average, three nodes within its transmission range Rt . Rt was set equal to 12 m, while the interference range is set equal to 1:5  Rt . Increasing the transmission range of each node increases the degree of network connectivity (and hence, the number of links in the network). This essentially reduces the average number of hops between any pair of nodes. Fewer channels are then required to connect any pair of nodes. From this perspective, increasing the connectivity degree can improve the QoS performance of the network. However, increasing Rt consequently increases RI . The increased interference among nodes may reduce the real capacity of the network to carry connections. Clearly, there is a trade-off between the above opposite trends to maximize the network throughput. This is illustrated in Fig. 9a, where the acceptance probability of the total system of networks is plotted as a function of the connectivity degree . Each system of networks receives a traffic intensity with jLj ¼ 10 (i.e., jLj=2 ¼ 5 connection requests for each network). Two cases are considered: each service provider network possesses Mk ¼ 1 or 2 channels.

Fig. 9. Impact of the WMN connectivity degree . (a) Probability of accepted connections. (b) Spectrum reuse. (c) Average number of hops per accepted connection.

BOUABDALLAH ET AL.: PERFORMANCE OF COGNITIVE RADIO-BASED WIRELESS MESH NETWORKS

133

Fig. 10. Probability of accepted connections. (a) 20-node WMN. (b) 40-node WMN. (c) 60-node WMN.

According to the results in Fig. 9a, we can draw two main observations: In all cases, the capacity of the network to accept connections is a convex function of . This is representative of the aforementioned trade-off. On the one hand, small values of  (i.e., Rt ) result in extremely long multihop paths between nodes, which increases the number of channels required to carry a connection. On the other hand, high values of  increase the interference among nodes. This reduces the real capacity of the network. Therefore, there is an optimal value of  that maximizes the network capacity. In our experiments,  ¼ 7:4 corresponding to Rt ¼ 19 m represents the optimal setting. We can see that correctly adjusting the transmission ranges of nodes can increase the network capacity without requiring new channels. . Enhancing the system with CR (either for one or both networks) practically doubles the capacity, most notably for small to moderate values of . This result confirms that CR creates significant gains. However, for high values of , all the nodes are at one hop from each other. Hence, enabling CR has very little effect on the overall acceptance probability. Fig. 9b shows that the system’s spectrum reuse decreases drastically with . This is for two reasons. First, increasing  increases the interference range so that each transmission forces a greater number of other links to remain inactive. Second, increasing  decreases the average number of hops needed to connect nodes, as shown in Fig. 7c. As a result, fewer resources are required, reducing the overall utilization. .

5.4 Randomly Generated WMNs In addition to the 23-node WMN sample, results have been produced for three randomly generated WMNs, consisting of 20, 40, and 60 nodes, respectively. This covers a range of network sizes, although we are obviously limited by the ILP technique being used. Although some works and deployments have considered much larger networks, the typical approach has been to rely on network partitioning based on the clustering/association to individual gateways. Currently, WMNs clusters are typically less than 20 nodes per gateway, due to severe performance limitations. Fig. 10 shows the acceptance probability as a function of the number of channels Mk per network k. Again, two

classic networks, one classic + one cognitive network, and two cognitive networks are compared. Each system of WMNs receives a traffic intensity of jLj ¼ 10. As in the previous results, enhancing the system with CR significantly improves the network capacity. Capacity to accept clients practically doubles in several cases. It is also worth noting that there is an advantage to be gained by having both networks CR-enabled compared rather than only one. Moreover, we can see that the gain introduced by enabling CR is more pronounced with the small 20-node WMN compared to the 40-node WMN. This is because for the same traffic load and number of channels per network, connections within relatively larger WMNs are carried using longer paths, thus requiring more resources. Although large networks offer more disjoint routes to carry additional connections while avoiding the interferences issues, the 40-node WMN capacity to accept flows decreases compared to the 20-node network case. However, when the effect of increased spatial reuse dominates the effect of longer path lengths, the capacity of large networks to accept connections outperforms that of smaller networks, as seen in the 60-node sample network case (Fig. 10c).

5.5 Mixed User Types and QoS In Section 5.2.1, it was shown that with the same traffic intensities, a cognitive network could greatly increase its acceptance capacity relative to a classic network. In this section, it is shown that cognitive abilities can also differentiate QoS for different user types on the same network. Consider the following scenario. Each system has two networks, where the number of connection requests for each network is 5 (i.e., a total set of jLj ¼ 10 connection requests arrives to the system). Three different cases are considered for the traffic: 1) all the connections are classic connections, 2) all the connections are CR-enabled, and 3) 60 percent of the connections are classic and the remaining 40 percent are cognitive. Fig. 11 shows the acceptance probabilities, as the number of channels per network in the system is varied between 1 and 10. As previously illustrated, networks carrying all cognitive traffic see an increase in acceptance probability compared to the purely classic system. The system of networks with mixed traffic shows that the QoS delivered to classic and cognitive users is also differentiated. The classic users see the same acceptance probability, as each classic user has a preemptive priority over

134

IEEE TRANSACTIONS ON MOBILE COMPUTING,

CR-enabled foreign connections. However, the acceptance probability of the cognitive users rapidly increases, beyond even the probability of the all cognitive user system. Most importantly, the overall acceptance probability for the entire mixed system also improves relative to the all classic case. These results can be interpreted from a QoS-level perspective as follows: A gold client may request an acceptance probability of 90 percent, a silver client requires an acceptance probability of 80 percent, whereas a bronze client needs a 70 percent guarantee on its service. In our mixed traffic system, the gold and the silver classes can be mapped together as CR-enabled connections, whereas the bronze class can be mapped as classic connections. In order to achieve the above QoS requirements, each network must be equipped with eight channels, as shown in Fig. 11. In this case, we can see that silver clients receive a better service (90 percent of acceptance probability) than required since they are mapped into the same class as the gold clients. This is, however, not desirable from the service provider perspective, as it is synonym to resource wastage. Mapping each class of service to its own class of connections can save resources while achieving the different QoS requirements. To do so, we define a new class of clients called “Premium CR-enabled clients.” In addition to their CR capabilities, this class of clients has the same priority to use resources on foreign networks as the home clients. In other words, a Premium CR-enabled client acts as a home (primary) user on all the visited networks. To take into account such class of clients in our ILP formulation of Section 4, we attribute hðlÞ ¼ 0 as home network value for each premium CR-enabled connection l. Moreover, we modify the constraints (20) and (21) as follows:



Sforeign ðlÞ 

8l; ð31Þ

ðk;mÞ Tði;jÞ yij ðlÞ

 if hðlÞ 6¼ k and CRðlÞ ¼ 1 and hðlÞ 6¼ 0 ;

NO. 1,

JANUARY 2011

Fig. 12. Introducing the class of Premium CR-enabled users: QoS differentiation by using CR capabilities.

Fig. 11. QoS differentiation by using CR capabilities.

Shome ðlÞ ¼ SuccessðlÞ if ðCRðlÞ ¼ 0 and hðlÞ ¼ 0Þ;

VOL. 10,

8i; j; k; m; l: ð32Þ

Fig. 12 shows the results when considering the new class of Premium CR-enabled clients. The same system of networks is considered as before, with the same traffic intensity. Again, three different cases are considered for the traffic: 1) all the connections are classic connections, 2) all the connections are CR-enabled, and 3) 60 percent of the

connections are classic, 20 percent are CR-enabled, and 20 percent are premium CR-enabled. Fig. 12 shows that the requirements of different clients can be fulfilled by mapping gold clients onto the Premium CR-enabled class, silver clients to the basic CR-enabled class, and bronze clients to the classic class. In doing so, different clients are satisfied while equipping each network with only six channels instead of the eight that were previously needed.

6

CONCLUSION

Cognitive radio is a potential solution to the tight resource constraints experienced by wireless mesh networks. By allowing the reuse of spectrum allocated to primary users, CR can be used to recapture wasted resources and utilize them in other ways, without affecting primary user service. In this work, we have studied the improvements that can be gained from using CR in a WMN. From a classic system where primary service providers have assigned channel resources and all users belong to a home network (and must receive their service on their service provider’s channels), we added CR-capabilities. CR-enabled nodes can operate on any channel, as required. After formulating the problem using integer linear programming, several metrics were studied, including the probability of accepting flows, spatial reuse of spectrum, and the path lengths of serviced flows. Using an ILP-solver, the system was studied, comparing classic and CR-enabled networks, as well as purely virtual wireless networks. It was demonstrated that CR capabilities provide several benefits to a WMN. First, CR improves the QoS that can be provided to network flows. Alternatively, more flows can be supported by a service provider, or fewer channel resources can be used. Second, CR increases utilization by allowing the network more flexibility to service flows, particularly longer (more hops) flows. Third, CR provides a mechanism for QoS differentiation, where a CR-enabled achieves a higher level of service from the network, while still maintaining minimum service constraints for classic users. Solving an ILP is computationally expensive; however, our evaluation has shown that moderately sized networks could be handled within a reasonable time. For these

BOUABDALLAH ET AL.: PERFORMANCE OF COGNITIVE RADIO-BASED WIRELESS MESH NETWORKS

networks, the ILP, therefore, provides a potential method for obtaining an optimal resource management solution. However, for larger networks, the ILP approach becomes too cumbersome to be used in an online manner. To handle these situations, further investigations are required to develop an effective heuristic. Additionally, we intend to continue to extend the formulation to create a more general model for resource sharing. The removal of the colocation assumption made in this paper will allow both spectrum and infrastructure sharing to be considered. Variable channel characteristics and traffic demands are also required to more accurately reflect the real wireless environment. We believe that all of these are natural extensions to the model described in this paper, although each will require considerable study. For virtual wireless networks, despite having no dedicated spectrum resources, the feasibility of supporting QoS has been demonstrated. These VWNs benefit from having multiple primary networks from which they can borrow resources. The VWN supports additional users and considerably increases the utilization of channel resources. The successful operation of the VWN shows that the previously wasted spectrum resources of the primary networks have significant value.

ACKNOWLEDGMENTS This work was jointly supported by the Natural Science and Engineering Council of Canada (NSERC) under its Discovery program and the WCU (World Class University) program through the Korea National Research Foundation funded by the Ministry of Education, Science and Technology (Project No. R31-2008-000-10100-0).

REFERENCES [1] [2] [3]

MIT Roofnet, http://www.pdos.lcs.mit.edu/roofnet, 2010. Seattle Wireless, http://www.seattlewireless.net, 2010. R. Draves, J. Padhye, and B. Zill, “Routing in Multi-Radio, MultiHop Wireless Mesh Networks,” Proc. ACM MobiCom, Sept. 2004. [4] R. Draves, J. Padhye, and B. Zill, “Comparison of Routing Metrics for Static Multi-Hop Wireless Networks,” Proc. ACM SIGCOMM, Sept. 2004. [5] D. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A High Throughput Path Metric for Multi-Hop Wireless Routing,” Proc. ACM MobiCom, Sept. 2003. [6] M.A. McHenry et al., “Chicago Spectrum Occupancy Measurements & Analysis and a Long-Term Studies Proposal,” Proc. ACM First Int’l Workshop Technology and Policy for Accessing Spectrum, 2006. [7] FCC Spectrum Policy Task Force Report, Federal Communication Commission (USA), ET Docket No. 02-135, Nov. 2002. [8] Y.T. Hou, Y. Shi, and H.D. Sherali, “Spectrum Sharing for MultiHop Networking with Cognitive Radios,” IEEE J. Selected Area in Comm., vol. 26, no. 1, pp. 146-155, Jan. 2008. [9] K.R. Chowdhury and I.F. Akyildiz, “Cognitive Wireless Mesh Networks with Dynamic Spectrum Access,” IEEE J. Selected Area in Comm., vol. 26, no. 1, pp. 168-181, Jan. 2008. [10] K. Yang and X. Wang, “Cross-Layer Network Planning for MultiRadio Multi-Channel Cognitive Wireless Networks,” IEEE Trans. Comm., vol. 56, no. 10, pp. 1705-1714, Oct. 2008. [11] J. Mitola III and G.Q. Maguire Jr., “Cognitive Radio: Making Software Radios More Personal,” IEEE Personal Comm., vol. 6, no. 4, pp. 13-18, Aug. 1999. [12] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE J. Selected Areas in Comm., vol. 23, no. 2, pp. 201-220, Feb. 2005.

135

[13] C. Cordeiro et al., “IEEE 802.22: The First Worldwide Wireless Standard Based on Cognitive Radios,” Proc. First IEEE Int’l Symp. New Frontiers in Dynamic Spectrum Access Networks, pp. 328-337, Nov. 2005. [14] M. Much et al., “IEEE P1900.B: Coexistence Support for Reconfigurable, Heterogeneous Air Interfaces,” Proc. Second IEEE Int’l Symp. New Frontiers in Dynamic Spectrum Access Networks, pp. 381-389, Apr. 2007. [15] N. Devroye, P. Mitran, and V. Tarokh, “Achievable Rates in Cognitive Radio Channels,” IEEE Trans. Information Theory, vol. 52, no. 5, pp. 1813-1827, May 2006. [16] S.A. Jafar and S. Srinivasa, “Capacity Limits of Cognitive Radio with Distributed and Dynamic Spectral Activity,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 529-537, Apr. 2007. [17] M. Alicherry, R. Bhatia, and L. Li, “Joint Channel Assignment and Routing for Throughput Optimization in Multi-Radio Wireless Mesh Networks,” Proc. ACM MobiCom, pp. 58-72, Sept. 2005. [18] X. Lin and S. Rasool, “A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad Hoc Wireless Networks,” Proc. IEEE INFOCOM, May 2007. [19] A. Karnik, A. Iyer, and C. Rosenberg, “Throughput-Optimal Configuration of Fixed Wireless Networks,” IEEE Trans. Networking, vol. 16, no. 5, pp. 1161-1174, Oct. 2008. [20] B. Ishibashi, N. Bouabdallah, and R. Boutaba, “QoS Performance Analysis of Cognitive Radio-Based Virtual Wireless Networks,” Proc. INFOCOM, Apr. 2008. [21] L. Qiu, Y. Zhang, F. Wang, M.K. Han, and R. Mahajan, “A General Model of Wireless Interference,” Proc. MobiCom, Sept. 2007. [22] ILOG CPLEX, http://www.ilog.com, 2010. Nizar Bouabdallah received the BS degree in telecommunications engineering from Ecole Superieur des Communications (Sup’Com), Tunis, Tunisia, in 2001, and the MS and PhD degrees in computer science from the University of Paris VI, France, in 2002 and 2004, respectively. He was with Alcatel Research Laboratories, Marcoussis, France, from 2002 to 2004, while working on the PhD degree. In 2005, he was with North Carolina State University, Raleigh, as a postdoctoral fellow. He is currently a researcher at Institut National de Recherche en Informatique et en Automatique (INRIA). In 2007, he spent six months as a visiting researcher in the School of Computer Science, University of Waterloo, Canada. His research interests include wireless mesh and sensor networks, optical networking, resource allocation under QoS, network planning and modeling, as well as performance evaluation. Brent Ishibashi received the BSc degree in computer and information sciences from the University of Guelph, Canada, in 2000, and the MMath degree in computer science in 2004 from the University of Waterloo, Canada, where he is currently working toward the PhD degree under the supervision of Prof. R. Boutaba. His research interests include wireless resource management, wireless ad hoc and mesh networks, and cognitive radio.

Raouf Boutaba received the MSc and PhD degrees in computer science from the University Pierre & Marie Curie, Paris, in 1990 and 1994, respectively. He is currently a professor of computer science at the University of Waterloo. His research interests include network, resource and service management in multimedia wired, and wireless networks. He is the founder and editor in chief of the IEEE Transactions on Network and Service Management and on the editorial boards of several other journals. He is currently a distinguished lecturer of the IEEE Communications Society and the chairman of the IEEE Technical Committees on Information Infrastructure and on Autonomic Communications. He has received several best paper awards and other recognitions such as the Premiers Research Excellence Award.

Suggest Documents